Keep Your Organisation Quantum-Safe And Futureproof

Symmetrikey is the world’s first Reciprocal Kolmogorov Key Establishment (RKKE) protocol, which uses the mathematical principle of Kolmogorov complexity to create symmetrical keys that are secure against both classical and quantum computing attacks. It is deployed via a lightweight software implementation, and is suited for low-latency applications in industries including telecoms, financial services, and defence.  

Symmetrikey also enables you to create two-way endpoint verification and a corridor or perfect secrecy for communications, turning traditional public key infrastructure on its head while improving your security. 

Who Can Use Symmetrikey?

Symmetrikey has a wide range of applications and use cases, and can be implemented at every level of the tech stack. We’re interested in partnering with organisations that want to build new products using quanty-secure message exchange and endpoint verification capabilities. 

Passwordless Authentication

Using our unique two-way endpoint verification gives you a method of passwordless authentication that protects trust in your organisation.

Embedded Systems Security

Symmetrikey can be implemented at any level in the OSI model, making it a complementary and impenetrable additional layer of security. Symmetrikey can also alert you to attempts to intercept your communications, allowing you to respond faster to attacks. 

Quantum Safe Solutions

Because Symmetrikey’s security is based on Kolmogorov Complexity rather than mathematical hardness, it can’t be beaten by advances in classical computing or even the advent of quantum computing.

Come And Meet Us

Our team can often be found at networking events and cybersecurity forums. We’d love to say hello, answer your questions, and discuss potential projects with you.  

Food for thought

Stay up to date with the latest on Symmetrikey, quantum security, and cryptography in our blog.

Be a part of the journey

We are launching a commercial product and inviting potential technology partners, large enterprises, and government security services to join the waiting list for early access testing.